<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Auto-block admin &amp;quot;hammer&amp;quot; attempts? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/auto-block-admin-quot-hammer-quot-attempts/m-p/18326#M13359</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been seeing stuff in the system log like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;User 'caitlen' failed authentication. Reason: Authentication profile not found for the user From: [some hacker in China's IP]. &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a huge string of these, obviously it's reading through a dictionary and trying a bunch of accounts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to get the PAN to ignore the IP for some period of time after a certain number of failed authentication attempts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still using the default "Admin" account, is there a document anywhere that would allow me to tie Admin authentication to LDAP or RADIUS, and then am I able to disable the admin account completely?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Feb 2011 19:27:48 GMT</pubDate>
    <dc:creator>bradenmcg</dc:creator>
    <dc:date>2011-02-25T19:27:48Z</dc:date>
    <item>
      <title>Auto-block admin "hammer" attempts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/auto-block-admin-quot-hammer-quot-attempts/m-p/18326#M13359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been seeing stuff in the system log like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;User 'caitlen' failed authentication. Reason: Authentication profile not found for the user From: [some hacker in China's IP]. &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a huge string of these, obviously it's reading through a dictionary and trying a bunch of accounts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to get the PAN to ignore the IP for some period of time after a certain number of failed authentication attempts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still using the default "Admin" account, is there a document anywhere that would allow me to tie Admin authentication to LDAP or RADIUS, and then am I able to disable the admin account completely?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2011 19:27:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/auto-block-admin-quot-hammer-quot-attempts/m-p/18326#M13359</guid>
      <dc:creator>bradenmcg</dc:creator>
      <dc:date>2011-02-25T19:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Auto-block admin "hammer" attempts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/auto-block-admin-quot-hammer-quot-attempts/m-p/18327#M13360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Braden,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might consider disabling HTTPS and SSH admin access to your device through any of the external L3 interfaces, if possible and only use the out-of-band management interface.&amp;nbsp; Make sure the management interface is behind the firewall and is does not have a publicly routeable or NAT'ed address.&amp;nbsp; If it must be accessible externally, you might consider configuring a security policy that protects the management port with a Vulnerability Protection Profile to help block intrusion attempts.&amp;nbsp; In the 4.0 release you can also enable a "block-ip" action for vulnerability signatures of your choice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, look into configuring specific "permitted IP&amp;nbsp; addresses" on an Interface Management Profile and attaching it to your L3 interface, or configuring permitted IP's on your out-of-band management interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Feb 2011 00:46:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/auto-block-admin-quot-hammer-quot-attempts/m-p/18327#M13360</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2011-02-26T00:46:16Z</dc:date>
    </item>
  </channel>
</rss>

